Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20190325205838.GA27235@openwall.com>
Date: Mon, 25 Mar 2019 21:58:38 +0100
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: PGP cracking, .asc and .skr files unrecognised by Gpg2john, "No password hashes loaded"

Hello George,

I'm really sorry we didn't get back to you on this sooner.

Please see below:

On Wed, Jan 02, 2019 at 04:03:23PM +0100, George Alaerts wrote:
> I have .asc and .skr files generated by "PGPfreeware 7.0.3 for
> non-commercial use". After running
>  Gpg2john secring.skr > George

Did this produce any output on the terminal?  What's the size of the
"George" file?

>  john --wordlist=password.lst --format=gpg George
> I got the message,
>  "No password hashes loaded (see FAQ)"
> I've checked the FAQ.txt and can't find a solution. Can anybody help? Thank
> you very much!
> I've attached a sample key below.
> I'm using "John the Ripper 1.8.0-jumbo-1 (Windows binaries, ZIP, 34 MB)" on
> Windows 10.

While 1.8.0-jumbo-1 is the latest build for Windows that we host
directly on the Openwall website currently, it's pretty old, and we
recommend that people use or at least try a newer revision of jumbo,
especially if this old build doesn't work for them.  1.8.0-jumbo-1 is
old enough that we wouldn't care to see if it has a bug or not, etc.

You can find a newer binary build here:

https://download.openwall.net/pub/projects/john/contrib/windows/

Currently, it is john-1.8.0.13-jumbo-b7eae75d7 for 64-bit Windows.

Or you can indeed build the latest bleeding-jumbo off GitHub from source
on your own.

> sample key from my samplekey.asc file for you to try:

Thank you!  I've just tested this as follows using recent
bleeding-jumbo, and the password gets cracked instantly:

[solar@...er run]$ cat pw-pgp-in
-----BEGIN PGP PRIVATE KEY BLOCK-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>
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=m4Th
-----END PGP PRIVATE KEY BLOCK-----
[solar@...er run]$ ./gpg2john pw-pgp-in > pw

File pw-pgp-in
[solar@...er run]$ ./john pw
Warning: detected hash type "gpg", but the string is also recognized as "gpg-opencl"
Use the "--format=gpg-opencl" option to force loading these as that type instead
Using default input encoding: UTF-8
Loaded 1 password hash (gpg, OpenPGP / GnuPG Secret Key [32/64])
Cost 1 (s2k-count) is 65536 for all loaded hashes
Cost 2 (hash algorithm [1:MD5 2:SHA1 3:RIPEMD160 8:SHA256 9:SHA384 10:SHA512 11:SHA224]) is 2 for all loaded hashes
Cost 3 (cipher algorithm [1:IDEA 2:3DES 3:CAST5 4:Blowfish 7:AES128 8:AES192 9:AES256 10:Twofish 11:Camellia128 12:Camellia192 13:Camellia256]) is 3 for all loaded hashes
Will run 32 OpenMP threads
Proceeding with single, rules:Single
Press 'q' or Ctrl-C to abort, almost any other key for status
sample key       (sample key)
1g 0:00:00:00 DONE 1/3 (2019-03-25 21:01) 4.761g/s 152.3p/s 152.3c/s 152.3C/s sample key..samplekeykey
Use the "--show" option to display all of the cracked passwords reliably
Session completed

Three things for us (JtR jumbo developers) to note and possibly fix:

1. I had to insert an empty line after the "Version: " line.  Maybe we
shouldn't require that empty line, especially if PGPfreeware produces
output without that empty line?

2. Having both a private and a public key in the file made gpg2john
refuse to process the file.  I had to delete the public key from there,
even though I initially tried putting both in there.  Maybe we should
have gpg2john silently skip the public key(s), or in general skip (but
mention on stderr?) whatever it can't recognize?

3. gpg2john outputs an empty line and "File ..." to stderr.  I doubt
this serves a purpose, and IIRC is inconsistent with our other *2john
tools.  Maybe we should drop that.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.